NPTEL Introduction to Internet of Things Week 8 Assignment Answers 2024
1. Which of the following abstracts the physical resources from the network services?
a. Path management
b. Routing protocols
c. Flow-table paradigm
d. Network Virtualization
Answer :- For Answers Click Here
2. In which of these, exact match rules are useful?
a. Elephant Flow
b. Mice-flow
c. Both a and b
d. Neither a nor b
Answer :- For Answers Click Here
3. Which of these takes last k-th location instances to predict the next location?
a. Odin-k Markov Predictor
b. Order-k Markov interpreter
c. Order-k Markov predictor
d. None of these
Answer :- For Answers Click Here
4. Which of the following is an important issue due to the dynamic nature of the loT network?
a. Match rules
b. Load rules
c. Match balancing
d. Load Balancing
Answer :- d
5. Fill in the blank.
_______________refers to heterogeneous computing nodes distributed over a wide area to perform very large tasks.
a. Cluster Computing
b. Utility Computing
c. Grid Computing
d. None of these
Answer :-
6. Which of the following is a type of service model in cloud computing?
a. SaaS
b. PaaS
c. laaS
d. All of these
Answer :- For Answers Click Here
7.
Answer :-
8. Fill in the blank.
_____________means independent of device or location.
a. Scalable
b. Reliability
c. Agile
d. Ubiquitous
Answer :-
9. Fill in the blank.
_________provides the platform which allows developers to create applications which can be offered as a service via the Internet.
a. Software-as-a-Service
b. Storage-as-a-Service
c. Network-as-a-Service
d. Platform-as-a-Service
Answer :- For Answers Click Here
10. Fill in the blank. ‘Dynamic scaling of the required infrastructure resources’ is a feature of which of
the essential characteristic of cloud computing.
a. Scalability
b. Availability
c. Synchronization
d. None of these
Answer :-
11. Software-as-a-Service does not support a fully pay-as-you-go model.
a. True
b. False
Answer :-
12. What is the meaning of the Host Level Security at PaaS and SaaS level?
a. Hide host OS from the end users
b. Security responsibilities are transformed to Cloud service providers
c. Both a and b
d. Neither a nor b
Answer :- For Answers Click Here
13. Which of the following is an objective of Data Security?
a. Confidentiality
b. Integrity
c. Availability
d. All of these
Answer :-
14. CloudSim provides a cloud environment.
a. True
b. False
Answer :-
15. Which of the following is true about GreenCloud?
a. GreenCloud cannot monitor the energy consumption of servers, switches, etc.
b. GreenCloud was developed as an extension of GO.
c. Neither a nor b
d. Both a and b
Answer :- For Answers Click Here